System and Method for Revocable Peer-to-Peer Payments
A method, system, and computer program product is provided for revocable peer-to-peer payments. The method includes generating an asymmetric key pair comprising a first key and a second key, encrypting at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data, storing the encrypted payment data, communicating the second key to a first device associated with the first user, receiving the second key from a second device associated with the second user, decrypting the encrypted payment data based on the second key received from the second device, and processing the payment from the first account to the second account based on decrypting the encrypted payment data.
This application is the United States national phase of International Application No. PCT/US2020/014564 filed Jan. 22, 2020, the entire disclosure of which is hereby incorporated by reference in its entirety.
BACKGROUND 1. Technical FieldThis disclosure relates generally to payments between users and, in non-limiting embodiments or aspects, systems, methods, and computer program products for revocable peer-to-peer payments.
2. Technical ConsiderationsUsers wishing to send payments to other users may do so using direct payments through, for example, their respective banks. However, once such a payment is made it cannot be revoked by the payor. This, even if the payee user is not present to accept the payment, the payment is transferred to an account of the payee and cannot be recovered by the payor.
SUMMARYAccording to non-limiting embodiments or aspects, provided is a computer-implemented method, comprising: receiving, with at least one processor, peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generating, with at least one processor, an asymmetric key pair comprising a first key and a second key; encrypting, with at least one processor, at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; storing, with at least one processor, the encrypted payment data; communicating, with at least one processor, the second key to a first device associated with the first user; receiving, with at least one processor, the second key from a second device associated with the second user; decrypting, with at least one processor, the encrypted payment data based on the second key received from the second device; and processing the payment from the first account to the second account based on decrypting the encrypted payment data.
In non-limiting embodiments or aspects, the computer-implemented method further comprises: automatically transmitting the second key from the first device to the second device in response to input from the first user. In non-limiting embodiments or aspects, the computer-implemented method further comprises: automatically transmitting the second key from the first device to the second device in response to determining at least one rule has been satisfied. In non-limiting embodiments or aspects, the computer-implemented method further comprises generating, with at least one processor, a payment token based on the peer-to-peer payment data. In non-limiting embodiments or aspects, the payment token comprises the encrypted payment data. In non-limiting embodiments or aspects, the encrypted payment data comprises an encrypted value of a payment amount. In non-limiting embodiments or aspects, the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount. In non-limiting embodiments or aspects, the computer-implemented method further comprises: communicating, with at least one processor, at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account. In non-limiting embodiments or aspects, at least one processor of a payment system arranged remotely from the first device, the second device, and the first issuer system generates the asymmetric key pair, encrypts the at least a portion of the peer-to-peer payment data, and communicates the second key to the first device.
According to non-limiting embodiments or aspects, provided is a system for revocable peer-to-peer payments, comprising at least one processor programmed or configured to: receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generate an asymmetric key pair comprising a first key and a second key; encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; store the encrypted payment data; communicate the second key to a first device associated with the first user; receive the second key from a second device associated with the second user; decrypt the encrypted payment data based on the second key received from the second device; and process the payment from the first account to the second account based on decrypting the encrypted payment data.
In non-limiting embodiments or aspects, the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user. In non-limiting embodiments or aspects, the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to determining at least one rule has been satisfied. In non-limiting embodiments or aspects, the at least one processor is further programmed or configured to generate a payment token based on the peer-to-peer payment data. In non-limiting embodiments or aspects, the payment token comprises the encrypted payment data. In non-limiting embodiments or aspects, the encrypted payment data comprises an encrypted value of a payment amount. In non-limiting embodiments or aspects, the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount. In non-limiting embodiments or aspects, the at least one processor is further programmed or configured to communicate at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account. In non-limiting embodiments or aspects, the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user.
According to non-limiting embodiments or aspects, provided is a computer program product for revocable peer-to-peer payments, comprising at least one non-transitory computer-readable medium including program instructions that, when executed by at least one processor, cause the at least one processor to: receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generate an asymmetric key pair comprising a first key and a second key; encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; store the encrypted payment data; communicate the second key to a first device associated with the first user; receive the second key from a second device associated with the second user; decrypt the encrypted payment data based on the second key received from the second device; and process the payment from the first account to the second account based on decrypting the encrypted payment data. In non-limiting embodiments or aspects, the program instructions, when executed by the at least one processor, further cause the at least one processor to generate a payment token based on the peer-to-peer payment data.
Other non-limiting embodiments or aspects will be set forth in the following numbered clauses:
Clause 1: A computer-implemented method, comprising: receiving, with at least one processor, peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generating, with at least one processor, an asymmetric key pair comprising a first key and a second key; encrypting, with at least one processor, at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; storing, with at least one processor, the encrypted payment data; communicating, with at least one processor, the second key to a first device associated with the first user; receiving, with at least one processor, the second key from a second device associated with the second user; decrypting, with at least one processor, the encrypted payment data based on the second key received from the second device; and processing the payment from the first account to the second account based on decrypting the encrypted payment data.
Clause 2: The computer-implemented method of clause 1, further comprising: automatically transmitting the second key from the first device to the second device in response to input from the first user.
Clause 3: The computer-implemented method of clauses 1 or 2, further comprising: automatically transmitting the second key from the first device to the second device in response to determining at least one rule has been satisfied.
Clause 4: The computer-implemented method of any of clauses 1-3, further comprising generating, with at least one processor, a payment token based on the peer-to-peer payment data.
Clause 5: The computer-implemented method of any of clauses 1-4, wherein the payment token comprises the encrypted payment data.
Clause 6: The computer-implemented method of any of clauses 1-5, wherein the encrypted payment data comprises an encrypted value of a payment amount.
Clause 7: The computer-implemented method of any of clauses 1-6, wherein the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount.
Clause 8: The computer-implemented method of any of clauses 1-7, further comprising: communicating, with at least one processor, at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account.
Clause 9: The computer-implemented method of any of clauses 1-8, wherein at least one processor of a payment system arranged remotely from the first device, the second device, and the first issuer system generates the asymmetric key pair, encrypts the at least a portion of the peer-to-peer payment data, and communicates the second key to the first device.
Clause 10: A system for revocable peer-to-peer payments, comprising at least one processor programmed or configured to: receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generate an asymmetric key pair comprising a first key and a second key; encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; store the encrypted payment data; communicate the second key to a first device associated with the first user; receive the second key from a second device associated with the second user; decrypt the encrypted payment data based on the second key received from the second device; and process the payment from the first account to the second account based on decrypting the encrypted payment data.
Clause 11: The system of clause 10, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user.
Clause 12: The system of clauses 10 or 11, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to determining at least one rule has been satisfied.
Clause 13: The system of any of clauses 10-12, wherein the at least one processor is further programmed or configured to generate a payment token based on the peer-to-peer payment data.
Clause 14: The system of any of clauses 10-13, wherein the payment token comprises the encrypted payment data.
Clause 15: The system of any of clauses 10-14, wherein the encrypted payment data comprises an encrypted value of a payment amount.
Clause 16: The system of any of clauses 10-15, wherein the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount.
Clause 17: The system of any of clauses 10-16, wherein the at least one processor is further programmed or configured to communicate at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account.
Clause 18: The system of any of clauses 10-17, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user.
Clause 19: A computer program product for revocable peer-to-peer payments, comprising at least one non-transitory computer-readable medium including program instructions that, when executed by at least one processor, cause the at least one processor to: receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount; generate an asymmetric key pair comprising a first key and a second key; encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data; store the encrypted payment data; communicate the second key to a first device associated with the first user; receive the second key from a second device associated with the second user; decrypt the encrypted payment data based on the second key received from the second device; and process the payment from the first account to the second account based on decrypting the encrypted payment data.
Clause 20: The computer program product of clause 19, wherein the program instructions, when executed by the at least one processor, further cause the at least one processor to generate a payment token based on the peer-to-peer payment data.
These and other features and characteristics of the present disclosure, as well as the methods of operation and functions of the related elements of structures and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the disclosure.
Additional advantages and details are explained in greater detail below with reference to the non-limiting, exemplary embodiments that are illustrated in the accompanying figures, in which:
For purposes of the description hereinafter, the terms “end,” “upper,” “lower,” “right,” “left,” “vertical,” “horizontal,” “top,” “bottom,” “lateral,” “longitudinal,” and derivatives thereof shall relate to the embodiments as they are oriented in the drawing figures. However, it is to be understood that the embodiments may assume various alternative variations and step sequences, except where expressly specified to the contrary. It is also to be understood that the specific devices and processes illustrated in the attached drawings, and described in the following specification, are simply exemplary embodiments or aspects of the disclosure. Hence, specific dimensions and other physical characteristics related to the embodiments or aspects disclosed herein are not to be considered as limiting.
No aspect, component, element, structure, act, step, function, instruction, and/or the like used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items and may be used interchangeably with “one or more” and “at least one.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, a combination of related and unrelated items, and/or the like) and may be used interchangeably with “one or more” or “at least one.” Where only one item is intended, the term “one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based at least partially on” unless explicitly stated otherwise.
As used herein, the term “communication” may refer to the reception, receipt, transmission, transfer, provision, and/or the like, of data (e.g., information, signals, messages, instructions, commands, and/or the like). For one unit (e.g., a device, a system, a component of a device or system, combinations thereof, and/or the like) to be in communication with another unit means that the one unit is able to directly or indirectly receive information from and/or transmit information to the other unit. This may refer to a direct or indirect connection (e.g., a direct communication connection, an indirect communication connection, and/or the like) that is wired and/or wireless in nature. Additionally, two units may be in communication with each other even though the information transmitted may be modified, processed, relayed, and/or routed between the first and second unit. For example, a first unit may be in communication with a second unit even though the first unit passively receives information and does not actively transmit information to the second unit. As another example, a first unit may be in communication with a second unit if at least one intermediary unit processes information received from the first unit and communicates the processed information to the second unit.
As used herein, the term “computing device” may refer to one or more electronic devices configured to process data. A computing device may, in some examples, include the necessary components to receive, process, and output data, such as a processor, a display, a memory, an input device, a network interface, and/or the like. A computing device may be a mobile device. As an example, a mobile device may include a cellular phone (e.g., a smartphone or standard cellular phone), a portable computer, a wearable device (e.g., watches, glasses, lenses, clothing, and/or the like), a personal digital assistant (PDA), and/or other like devices. A computing device may also be a desktop computer or other form of non-mobile computer.
As used herein, the term “server” may refer to or include one or more computing devices that are operated by or facilitate communication and processing for multiple parties in a network environment, such as the Internet, although it will be appreciated that communication may be facilitated over one or more public or private network environments and that various other arrangements are possible. Further, multiple computing devices (e.g., servers, point-of-sale (POS) devices, mobile devices, etc.) directly or indirectly communicating in the network environment may constitute a “system.” Reference to “a server” or “a processor,” as used herein, may refer to a previously-recited server and/or processor that is recited as performing a previous step or function, a different server and/or processor, and/or a combination of servers and/or processors. For example, as used in the specification and the claims, a first server and/or a first processor that is recited as performing a first step or function may refer to the same or different server and/or a processor recited as performing a second step or function.
As used herein, the term “graphical user interface” (GUI) refers to a generated display, such as one or more displays with which a user may interact, either directly or indirectly (e.g., through a keyboard, mouse, touchscreen, etc.).
As used herein, the term “transaction service provider” may refer to an entity that receives transaction authorization requests from merchants or other entities and provides guarantees of payment, in some cases through an agreement between the transaction service provider and an issuer institution. For example, a transaction service provider may include a payment network such as VisaⓇ or any other entity that processes transactions. The term “transaction processing system” may refer to one or more computing devices operated by or on behalf of a transaction service provider, such as a transaction processing server executing one or more software applications. A transaction processing system may include one or more processors and, in some non-limiting embodiments or aspects, may be operated by or on behalf of a transaction service provider.
As used herein, the term “issuer institution” may refer to one or more entities, such as a bank, that provide accounts to customers for conducting transactions (e.g., payment transactions), such as initiating credit and/or debit payments. For example, an issuer institution may provide an account identifier, such as a primary account number (PAN), to a customer that uniquely identifies one or more accounts associated with that customer. The account identifier may be embodied on a payment device, such as a physical financial instrument, e.g., a payment card, and/or may be electronic and used for electronic payments. The term “issuer system” refers to one or more computing devices operated by or on behalf of an issuer institution, such as a server computer executing one or more software applications. For example, an issuer system may include one or more authorization servers for authorizing a transaction.
Non-limiting embodiments are directed to a revocable and verifiable peer-to-peer payment system and method that enables users to make payments to other individuals in a secure and effective manner. In non-limiting embodiments or aspects, the use of cryptography to secure a portion of a payment token enables the payment token to be held by an issuer system until bring provided with a decryption key, thereby enabling for a delay between the initiation of the payment request and the processing of the payment. The disclosed infrastructure and flow of data between a payment system, a first user device (e.g., of the payor), a second user device (e.g., of the payee) and issuer systems (for accounts of both the payor and payee) enable for an improved peer-to-peer payment system that that avoids the extra computational resources associated with disputes, chargeback or reversal attempts, or the like.
With continued reference to
Still referring to
In non-limiting embodiments or aspects, the payment system 108 generates a payment token that is valid for a single use (e.g., a one-time use token) based on the user identifier of the second user 102, a unique identifier (e.g., a one-time code that is unique to the payment request), and an encrypted payment amount value (and/or some other portion of payment data). The encrypted value may be generated using a key from a pair of keys (e.g., a public or private key of a public/private key pair). For example, the payment amount value may be encrypted with a public key of a public/private key pair. In non-limiting embodiments or aspects, the key used to encrypt the payment amount value corresponds with the key 116 passed from the first user 100 to the second user 102 to unlock the payment. As an example, the payment amount value may be encrypted with a public key corresponding to a private key 116 used to unlock the payment. In non-limiting embodiments or aspects, the payment token may include a data structure including the user identifier, the unique identifier, and an encrypted payment amount value.
In non-limiting embodiments or aspects, the payment system 108 may generate an asymmetric key pair for each payment request. In other non-limiting embodiments or aspects, a key pair may be established previous to the payment request message being communicated and may be assigned the first user 100 and/or first user device 104. It will be appreciated that the payment token or some portion thereof (e.g., the payment amount value) may be encrypted with either key of an asymmetric key pair. In other non-limiting embodiments or aspects, a symmetric key may also be used.
Still referring to
Moreover, even after the key 116 is communicated to the second user 102, the first user 100 may still revoke the payment prior to the second user 102 completing the payment. For example, the first user 100 may communicate the key 116 to the second user and later decide to revoke the payment. If the second user 102 has not completed the payment by communicating the key 116 to the payment system 108 to request payment completion, the first user 100 may operate the first user device 104 to communicate a cancel payment message to the payment system 108. The cancel payment message may identify the original payment request message and may include the key 116 or some other key previously communicated to the first user device 104 by the payment system 108. In response to receiving the cancel payment message, the payment system 108 may cancel the payment such that it is no longer receivable by the second user 102, even if the second user 102 has the key 116.
Still referring to
With reference to
At step 2 of
At step 3 of
At step 6 of
With reference to
With continued reference to
Referring now to
As shown in
With continued reference to
Device 900 may perform one or more processes described herein. Device 900 may perform these processes based on processor 904 executing software instructions stored by a computer-readable medium, such as memory 906 and/or storage component 908. A computer-readable medium may include any non-transitory memory device. A memory device includes memory space located inside of a single physical storage device or memory space spread across multiple physical storage devices. Software instructions may be read into memory 906 and/or storage component 908 from another computer-readable medium or from another device via communication interface 914. When executed, software instructions stored in memory 906 and/or storage component 908 may cause processor 904 to perform one or more processes described herein. Additionally, or alternatively, hardwired circuitry may be used in place of or in combination with software instructions to perform one or more processes described herein. Thus, embodiments described herein are not limited to any specific combination of hardware circuitry and software. The term “programmed or configured,” as used herein, refers to an arrangement of software, hardware circuitry, or any combination thereof on one or more devices.
Although embodiments have been described in detail for the purpose of illustration, it is to be understood that such detail is solely for that purpose and that the disclosure is not limited to the disclosed embodiments or aspects, but, on the contrary, is intended to cover modifications and equivalent arrangements that are within the spirit and scope of the appended claims. For example, it is to be understood that the present disclosure contemplates that, to the extent possible, one or more features of any embodiment can be combined with one or more features of any other embodiment.
Claims
1. A computer-implemented method, comprising:
- receiving, with at least one processor, peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount;
- generating, with at least one processor, an asymmetric key pair comprising a first key and a second key;
- encrypting, with at least one processor, at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data;
- storing, with at least one processor, the encrypted payment data;
- communicating, with at least one processor, the second key to a first device associated with the first user;
- receiving, with at least one processor, the second key from a second device associated with the second user;
- decrypting, with at least one processor, the encrypted payment data based on the second key received from the second device; and
- processing the payment from the first account to the second account based on decrypting the encrypted payment data.
2. The computer-implemented method of claim 1, further comprising: automatically transmitting the second key from the first device to the second device in response to input from the first user.
3. The computer-implemented method of claim 1, further comprising: automatically transmitting the second key from the first device to the second device in response to determining at least one rule has been satisfied.
4. The computer-implemented method of claim 1, further comprising generating, with at least one processor, a payment token based on the peer-to-peer payment data.
5. The computer-implemented method of claim 4, wherein the payment token comprises the encrypted payment data.
6. The computer-implemented method of claim 5, wherein the encrypted payment data comprises an encrypted value of a payment amount.
7. The computer-implemented method of claim 4, wherein the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount.
8. The computer-implemented method of claim 1, further comprising:
- communicating, with at least one processor, at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account.
9. The computer-implemented method of claim 8, wherein at least one processor of a payment system arranged remotely from the first device, the second device, and the first issuer system generates the asymmetric key pair, encrypts the at least a portion of the peer-to-peer payment data, and communicates the second key to the first device.
10. A system for revocable peer-to-peer payments, comprising at least one processor programmed or configured to:
- receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount;
- generate an asymmetric key pair comprising a first key and a second key;
- encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data;
- store the encrypted payment data;
- communicate the second key to a first device associated with the first user;
- receive the second key from a second device associated with the second user;
- decrypt the encrypted payment data based on the second key received from the second device; and
- process the payment from the first account to the second account based on decrypting the encrypted payment data.
11. The system of claim 10, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user.
12. The system of claim 10, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to determining at least one rule has been satisfied.
13. The system of claim 10, wherein the at least one processor is further programmed or configured to generate a payment token based on the peer-to-peer payment data.
14. The system of claim 13, wherein the payment token comprises the encrypted payment data.
15. The system of claim 14, wherein the encrypted payment data comprises an encrypted value of a payment amount.
16. The system of claim 13, wherein the payment token comprises a unique identifier, an identifier associated with the second user, and the encrypted payment data, wherein the encrypted payment data comprises an encrypted value of a payment amount.
17. The system of claim 10, wherein the at least one processor is further programmed or configured to communicate at least a portion of the peer-to-peer payment data to a first issuer system associated with the first account.
18. The system of claim 10, wherein the at least one processor is further programmed or configured to automatically transmit the second key from the first device to the second device in response to input from the first user.
19. A computer program product for revocable peer-to-peer payments, comprising at least one non-transitory computer-readable medium including program instructions that, when executed by at least one processor, cause the at least one processor to:
- receive peer-to-peer payment data for a payment to be made from a first account associated with a first user to a second account associated with a second user, the peer-to-peer payment data comprising a payment amount;
- generate an asymmetric key pair comprising a first key and a second key;
- encrypt at least a portion of the peer-to-peer payment data with the first key to generate encrypted payment data;
- store the encrypted payment data;
- communicate the second key to a first device associated with the first user;
- receive the second key from a second device associated with the second user;
- decrypt the encrypted payment data based on the second key received from the second device; and
- process the payment from the first account to the second account based on decrypting the encrypted payment data.
20. The computer program product of claim 19, wherein the program instructions, when executed by the at least one processor, further cause the at least one processor to generate a payment token based on the peer-to-peer payment data.
Type: Application
Filed: Jan 22, 2020
Publication Date: Apr 6, 2023
Inventors: Gurpreet Singh Bhasin (Fremont, CA), Saswat Kumar Nayak (San Jose, CA)
Application Number: 17/794,311